The proposed Social Networking Online Protection Act is designed to shield the social networking passwords of job applicants and students.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing on access control, identity, privacy and security issues. Currently, he is the Identity Evangelist for strong authentication vendor Yubico, where he writes and edits a blog, as well as, directs several social media channels and represents Yubico at the FIDO Alliance. Prior to Yubico, John spent five years with identity vendor Ping Identity. He also spent 15 years as a senior editor for a variety of publications, including Communications Week, Internet Week and Network World, where he focused on enterprise topics including collaboration, directories, network infrastructure, databases, open source, ERP and security. He covered IBM, Microsoft, Cisco, Oracle, Red Hat, Google among other enterprise vendors. His work has also appeared in the New York Times, CNN, CIO and Mashable.
It will be at least a few weeks before the Electronic Privacy Information Center (EPIC) finds out if the FCC wants to provide an unedited copy of its report in the Google's Street View investigation.
Nearly 800,000 deceased Americans each year have their identity stolen by thieves looking for financial or other gain, according to a new study.
The Electronic Privacy Information Center wants to see the full, unedited report the Federal Communications Commission published on its investigation of Google and possible violations of wiretap laws.
The National Strategy for Trusted Identities in Cyberspace is getting its house in order a year after its inception. The issue now is if it can gain speed and rally a critical mass of public and private organizations to join the effort.
Finalists are picked for the $10 million pilot program being run by the National Strategy for Trusted Identities in Cyberspace (NSTIC).
A trio of researchers is experimenting with vibrations, sounds and flashing lights as the basis for futuristic, secure passwords.
The World Wide Web Consortium opens a three-day meeting to define the parameters of its Web Tracking Protection specification. It is being closely watched by the digital advertising industry and privacy and consumer groups.
The Identity in the Cloud technical committee at OASIS is calling on the public to help it vet identity standards for a myriad of cloud use cases from mobile to digital signatures.
Google has tweaked its search engine to ensure that when users change their passwords they are signed out everywhere.
To recover from a data breach, companies are turning to a number of procedures and technologies including re-education, identity and access management, and expanded use of encryption, a Ponemon Institute study reveals.
Industry luminary Kim Cameron, now a distinguished engineer with Microsoft working on identity, wrote the Seven Laws of Identity in 2005. He discusses with ZDNet why these seven "scientific" laws are revealing their insight seven years later.
The FTC issues a privacy report that garners overall praise but criticism for its self-regulatory proposals.
In 2005, industry luminary Kim Cameron penned his Seven Laws of Identity, outlining a hypothesis on how identity and privacy work on the Internet. Today, everything is going as perceived seven years ago, and it's not all bad.
Industry luminary Kim Cameron, now a distinguished engineer with Microsoft working on identity, wrote the Seven Laws of Identity in 2005. He discusses with ZDNet why these seven hypotheses are revealing their insight seven years later.